Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34301: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IPFire.org IPFire

0
Medium
VulnerabilityCVE-2025-34301cvecve-2025-34301cwe-79
Published: Tue Oct 28 2025 (10/28/2025, 14:35:16 UTC)
Source: CVE Database V5
Vendor/Project: IPFire.org
Product: IPFire

Description

IPFire versions prior to 2.29 (Core Update 198) contain a stored cross-site scripting (XSS) vulnerability that allows an authenticated attacker to inject arbitrary JavaScript code into the COUNTRY_CODE parameter when creating a location group. When a user adds a new location group, the application issues an HTTP POST request with the ACTION parameter set to savelocationgrp, and the value of the COUNTRY_CODE parameter determines the flag displayed for that group. The value of this parameter is stored and later rendered in the web interface without proper sanitization or encoding, allowing malicious scripts to be executed in the context of other users viewing the affected page.

AI-Powered Analysis

AILast updated: 10/28/2025, 15:05:41 UTC

Technical Analysis

CVE-2025-34301 is a stored cross-site scripting (XSS) vulnerability identified in IPFire, an open-source firewall distribution widely used for network security. The vulnerability exists in versions prior to 2.29 (Core Update 198) and arises from improper neutralization of input during web page generation, specifically in the handling of the COUNTRY_CODE parameter when creating location groups. When an authenticated user submits a POST request with ACTION=savelocationgrp, the COUNTRY_CODE parameter's value is stored and later rendered in the web interface without proper sanitization or encoding. This flaw allows an attacker with valid credentials to inject malicious JavaScript code that will execute in the browsers of other users who view the affected page. The vulnerability is classified under CWE-79, indicating cross-site scripting due to improper input validation. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) reflects that the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), and user interaction (victim must view the malicious content). The impact is limited to the web interface context, potentially enabling session hijacking, unauthorized actions, or information disclosure within the IPFire management console. No public exploits have been reported yet, but the vulnerability poses a risk to environments relying on IPFire for perimeter security.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized execution of scripts within the IPFire management interface, potentially allowing attackers to hijack sessions, perform unauthorized administrative actions, or steal sensitive information from the firewall's web console. Since IPFire is often deployed in critical network infrastructure, exploitation could undermine network security controls, leading to broader compromise. The requirement for authentication limits exposure to insiders or compromised accounts, but the risk remains significant in environments with multiple administrators or where credential theft is possible. The vulnerability could disrupt operations, degrade trust in firewall integrity, and increase the attack surface for further intrusions. Organizations in sectors such as government, finance, energy, and telecommunications, which rely heavily on robust firewall solutions, may face heightened risks.

Mitigation Recommendations

Organizations should immediately upgrade IPFire installations to version 2.29 (Core Update 198) or later, where this vulnerability is addressed. If upgrading is not immediately feasible, administrators should restrict access to the IPFire web interface to trusted networks and users only, employing strong authentication mechanisms such as multi-factor authentication (MFA). Additionally, monitoring and auditing of administrative actions and user accounts should be enhanced to detect suspicious activity. Web application firewalls (WAFs) or reverse proxies can be configured to sanitize or block suspicious input patterns targeting the COUNTRY_CODE parameter. Educating administrators about the risks of XSS and encouraging cautious handling of location group creation can reduce the likelihood of exploitation. Regular vulnerability scanning and penetration testing focused on the firewall management interface can help identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6900d7521e78ed0e5889e094

Added to database: 10/28/2025, 2:46:42 PM

Last enriched: 10/28/2025, 3:05:41 PM

Last updated: 10/29/2025, 8:53:30 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats